The issue was addressed with improved checks. This issue is fixed in iOS 17.5 and iPadOS 17.5, tvOS 17.5, Safari 17.5, watchOS 10.5, macOS Sonoma 14.5. An attacker with arbitrary read and write capability may be able to bypass Pointer Authentication.
References
Configurations
Configuration 1 (hide)
|
Configuration 2 (hide)
|
Configuration 3 (hide)
|
History
12 Dec 2024, 14:33
Type | Values Removed | Values Added |
---|---|---|
First Time |
Apple ipados
|
|
CPE | cpe:2.3:o:apple:ipados:*:*:*:*:*:*:*:* |
09 Dec 2024, 19:27
Type | Values Removed | Values Added |
---|---|---|
CWE | NVD-CWE-noinfo | |
First Time |
Apple ipad Os
Wpewebkit wpe Webkit Apple tvos Fedoraproject fedora Apple macos Webkitgtk webkitgtk Apple iphone Os Apple safari Apple watchos Apple Wpewebkit Fedoraproject Webkitgtk |
|
CVSS |
v2 : v3 : |
v2 : unknown
v3 : 5.5 |
References | () http://seclists.org/fulldisclosure/2024/May/10 - Mailing List | |
References | () http://seclists.org/fulldisclosure/2024/May/12 - Mailing List | |
References | () http://seclists.org/fulldisclosure/2024/May/16 - Mailing List | |
References | () http://seclists.org/fulldisclosure/2024/May/17 - Mailing List | |
References | () http://seclists.org/fulldisclosure/2024/May/9 - Mailing List | |
References | () http://www.openwall.com/lists/oss-security/2024/05/21/1 - Mailing List | |
References | () https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ADCLQW54XN37VJZNYD3UKCYATJFIMYXG/ - Mailing List | |
References | () https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/WKIXADCW3O4R2OOSDZGPU55XQFE6NA3M/ - Mailing List | |
References | () https://support.apple.com/en-us/HT214101 - Vendor Advisory | |
References | () https://support.apple.com/en-us/HT214102 - Vendor Advisory | |
References | () https://support.apple.com/en-us/HT214103 - Vendor Advisory | |
References | () https://support.apple.com/en-us/HT214104 - Vendor Advisory | |
References | () https://support.apple.com/en-us/HT214106 - Vendor Advisory | |
CPE | cpe:2.3:o:fedoraproject:fedora:40:*:*:*:*:*:*:* cpe:2.3:o:apple:ipad_os:*:*:*:*:*:*:*:* cpe:2.3:a:wpewebkit:wpe_webkit:*:*:*:*:*:*:*:* cpe:2.3:a:apple:safari:*:*:*:*:*:*:*:* cpe:2.3:a:webkitgtk:webkitgtk:*:*:*:*:*:*:*:* cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:* cpe:2.3:o:apple:watchos:*:*:*:*:*:*:*:* cpe:2.3:o:apple:tvos:*:*:*:*:*:*:*:* cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:* cpe:2.3:o:fedoraproject:fedora:39:*:*:*:*:*:*:* |
Information
Published : 2024-05-14 15:13
Updated : 2024-12-12 14:33
NVD link : CVE-2024-27834
Mitre link : CVE-2024-27834
CVE.ORG link : CVE-2024-27834
JSON object : View
Products Affected
wpewebkit
- wpe_webkit
fedoraproject
- fedora
apple
- watchos
- macos
- tvos
- safari
- ipados
- iphone_os
webkitgtk
- webkitgtk
CWE